General

  • Target

    05c3883dab30dd8f521ad42b640fe1fbc7d851e03bbfbb0fb7a50502996f60c9.bin

  • Size

    2.6MB

  • Sample

    250403-1114ssvwfw

  • MD5

    28613695fc1c400cb69835f442b57f41

  • SHA1

    6e47845900ca01ef40f3af4b5e48aab43d3fc522

  • SHA256

    05c3883dab30dd8f521ad42b640fe1fbc7d851e03bbfbb0fb7a50502996f60c9

  • SHA512

    3aa9678b9807ac7b98b0da193ed83c081be396dd6fba10a7405a58428a5b6d15fa228558abedd174f0213c283bbd7c1c2e39456d297fb8387bc86beca6fe2992

  • SSDEEP

    24576:4EF4m51+WtE0CmFgqrhKf5O6HyLy9DhkOUl0XPTOWySeOBN2PkCr6c:4lJWu0J2P3ZUldWdeOBRCrz

Malware Config

Targets

    • Target

      05c3883dab30dd8f521ad42b640fe1fbc7d851e03bbfbb0fb7a50502996f60c9.bin

    • Size

      2.6MB

    • MD5

      28613695fc1c400cb69835f442b57f41

    • SHA1

      6e47845900ca01ef40f3af4b5e48aab43d3fc522

    • SHA256

      05c3883dab30dd8f521ad42b640fe1fbc7d851e03bbfbb0fb7a50502996f60c9

    • SHA512

      3aa9678b9807ac7b98b0da193ed83c081be396dd6fba10a7405a58428a5b6d15fa228558abedd174f0213c283bbd7c1c2e39456d297fb8387bc86beca6fe2992

    • SSDEEP

      24576:4EF4m51+WtE0CmFgqrhKf5O6HyLy9DhkOUl0XPTOWySeOBN2PkCr6c:4lJWu0J2P3ZUldWdeOBRCrz

    • Android SoumniBot payload

    • SoumniBot

      SoumniBot is an Android banking trojan first seen in April 2024.

    • Soumnibot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks